CVE-2009-0834 kernel: x86-64: syscall-audit: 32/64 syscall hole

Solution Verified - Updated -

Issue

  • Fix request of CVE-2009-0834 on 5.2.z.
  • On x86-64, a 32-bit process (TIF_IA32) can switch to 64-bit mode with ljmp, and
    then use the "syscall" instruction to make a 64-bit system call. A 64-bit
    process make a 32-bit system call with int $0x80.

  • In both these cases, audit_syscall_entry() will use the wrong system call
    number table and the wrong system call argument registers. This could be used
    to circumvent a syscall audit configuration that filters based on the syscall
    numbers or argument details.

Environment

  • Red Hat Enterprise Linux 5 Update 2
  • All architectures

Subscriber exclusive content

A Red Hat subscription provides unlimited access to our knowledgebase, tools, and much more.

Current Customers and Partners

Log in for full access

Log In

New to Red Hat?

Learn more about Red Hat subscriptions

Using a Red Hat product through a public cloud?

How to access this content